Firewall Rules

If PVS is placed immediately behind a firewall such that all of the traffic presented to PVS flows through the firewall, then the list of served ports, client side ports, and the respective IP addresses of the users are readily available. Tools such as SecurityCenter CV’s Vulnerability Analysis interface allow information about these ports (both client and server) to be browsed, sorted, and reported on. You can also view lists of IP addresses and networks using these client and server ports.

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.